|
|
【答案】应助回帖
商家已经主动声明此回帖可能含有宣传内容
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ... 孙飞龙: 金币+50, 翻译EPI+1, ★有帮助 2015-01-24 19:52:46 孙飞龙(RXMCDM代发): 金币+10 2015-01-25 02:02:11
Currently, the e-commerce, e-government affair system and financial and banking business are getting a momentum, therefore the security issue of e-commerce has become the focus of people’s attention. In order to ease the conflict between the difficulty of remembering the secret key and the randomness of secret key’s changement in e-commerce, as well as to solve insufficient relevance between secret key and users’ identity information, in this paper, based on the fingerprint feature processing technique of biometric features recognition, the fingerprint secrete key was generated and used in digital signature method.
Firstly, the paper analyzed the image processing method based on fingerprint detail recognition, however the fingerprint secrete key, generated according to the related fingerprint characteristic value by using this method, can hardly be valid due to problems including the differences of characteristic values of the same fingerprint, the uncertainty of length of characteristic values, and the possibility of faking or missing characteristic values.
As a result, this paper adopted the image processing method based on fingerprint texture
Secondly, this paper made research on a generated method of fake random fingerprint secrete key. This method can automatically modify and regenerate the initial secrete key, when the second-time input fingerprint characteristic value and initial characteristic value was from the same finger but different in values after the fingerprint secrete key was generated from characteristic value using fuzzy extraction technology. By integrating the generating method of fingerprint secrete key into the digital signature method, the security level of digital signature method can be effectively increased.
At last, by adopting the elliptic curve digital signature method, Hash function, and secrete key exchanging protocol, the fingerprint-based digital signature method was established, which was also demonstrated in terms of effectiveness through experiments. On this basis, in order to work out the key exposures of digital signature method, a strong forward security digital signature method was proposed and demonstrated in terms of effectiveness, security, and anti-fake property in this paper.
Through experiments, it shows that the digital signature method generated in the paper possesses a strong value theoretically and practically in e-commerce, financial and bank business. |
|